Three areas of cloud security
Regardless of how groups define cloud computing, it is essential to have a strategy and policies for how to use the cloud.
Enterprises should focus on the three primary areas of cloud security concern.
- Multitenancy Multitenancy, where enterprises share space with other customers, provides limited flexibility in services, With data out of the physical control of the enterprise, security becomes a concern. In fact, 38% of companies who don’t plan to use the public cloud cited security and privacy as the main reason.However, companies may be using security/privacy as a scapegoat for fears about relinquishing control over data and a major shift in the status quo of how enterprises are used to operating.“There’s been no correlation between security failure and the degree of multitenancy,” said Mr. Heiser. He noted that sometimes hybrid is a way that some organizations can become more confident in how to explore using the public cloud model.
- Virtualization Virtualization requires different vulnerability management and patching processes for the cloud environment. Organizations will use different tools to manage virtual machines. Plus, its complex, dynamic, and distributed nature means that there is no physical indication for safety such as the traditional “blinking lights.”
- SaaS SaaS applications offer an increasing level of security and control functionality. However, they are mostly under the control of end users, offer minimal transparency, and offer no customization. To add to the complexity, many enterprises often have at least 200 and up to 1,000 SaaS applications in use.
Pick your SaaS battles
At the end of the day, CISOs need to pick their battles and decide where time and resources are best spent when dealing with the risk context of this SaaS-scape. With this is mind, divide SaaS apps into three tiers.
Tier 1: Realistically, 80% of the market is in 100 cloud services. These are proven options, and though not without some risk, organizations should dwell on whether they are secure, but use them securely, said Mr. Heiser.
Tier 2: These companies, typically large brand names that are experimenting with cloud services, haven’t provided them as their main business for more than five years. Often vertically-oriented strategic apps, they lack third party evaluation. This is where CISOs should focus company resources and evaluation.
Tier 3: With over thousands of tier 3 cloud computing apps, these are practically noise, said Mr. Heiser. Don’t assume a tiny cloud service provider (CSP) is secure, or financially solvent. This may be an acceptable risk, but use Tier 3 CSPs carefully.